summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto/asn1/asn1_err.c
diff options
context:
space:
mode:
authortb <>2020-12-08 15:08:47 +0000
committertb <>2020-12-08 15:08:47 +0000
commit267ac14fa6781b6553b05a6d8dcdf99eaacc0edf (patch)
tree04d30b19586f2c165be5347140b51a43e96bb77e /src/lib/libcrypto/asn1/asn1_err.c
parentede7983d76de701a5269bb2be80a23f8da520e42 (diff)
downloadopenbsd-267ac14fa6781b6553b05a6d8dcdf99eaacc0edf.tar.gz
openbsd-267ac14fa6781b6553b05a6d8dcdf99eaacc0edf.tar.bz2
openbsd-267ac14fa6781b6553b05a6d8dcdf99eaacc0edf.zip
Fix a NULL dereference in GENERAL_NAME_cmp()libressl-v3.2.3
Comparing two GENERAL_NAME structures containing an EDIPARTYNAME can lead to a crash. This enables a denial of service attack for an attacker who can control both sides of the comparison. Issue reported to OpenSSL on Nov 9 by David Benjamin. OpenSSL shared the information with us on Dec 1st. Fix from Matt Caswell (OpenSSL) with a few small tweaks. ok jsing this is errata/6.8/008_asn1.patch.sig
Diffstat (limited to 'src/lib/libcrypto/asn1/asn1_err.c')
-rw-r--r--src/lib/libcrypto/asn1/asn1_err.c3
1 files changed, 2 insertions, 1 deletions
diff --git a/src/lib/libcrypto/asn1/asn1_err.c b/src/lib/libcrypto/asn1/asn1_err.c
index 5cc355084f..9c44da244b 100644
--- a/src/lib/libcrypto/asn1/asn1_err.c
+++ b/src/lib/libcrypto/asn1/asn1_err.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: asn1_err.c,v 1.21 2018/03/29 02:29:24 inoguchi Exp $ */ 1/* $OpenBSD: asn1_err.c,v 1.21.12.1 2020/12/08 15:08:47 tb Exp $ */
2/* ==================================================================== 2/* ====================================================================
3 * Copyright (c) 1999-2011 The OpenSSL Project. All rights reserved. 3 * Copyright (c) 1999-2011 The OpenSSL Project. All rights reserved.
4 * 4 *
@@ -85,6 +85,7 @@ static ERR_STRING_DATA ASN1_str_reasons[] = {
85 {ERR_REASON(ASN1_R_BAD_OBJECT_HEADER) , "bad object header"}, 85 {ERR_REASON(ASN1_R_BAD_OBJECT_HEADER) , "bad object header"},
86 {ERR_REASON(ASN1_R_BAD_PASSWORD_READ) , "bad password read"}, 86 {ERR_REASON(ASN1_R_BAD_PASSWORD_READ) , "bad password read"},
87 {ERR_REASON(ASN1_R_BAD_TAG) , "bad tag"}, 87 {ERR_REASON(ASN1_R_BAD_TAG) , "bad tag"},
88 {ERR_REASON(ASN1_R_BAD_TEMPLATE) , "bad template"},
88 {ERR_REASON(ASN1_R_BMPSTRING_IS_WRONG_LENGTH), "bmpstring is wrong length"}, 89 {ERR_REASON(ASN1_R_BMPSTRING_IS_WRONG_LENGTH), "bmpstring is wrong length"},
89 {ERR_REASON(ASN1_R_BN_LIB) , "bn lib"}, 90 {ERR_REASON(ASN1_R_BN_LIB) , "bn lib"},
90 {ERR_REASON(ASN1_R_BOOLEAN_IS_WRONG_LENGTH), "boolean is wrong length"}, 91 {ERR_REASON(ASN1_R_BOOLEAN_IS_WRONG_LENGTH), "boolean is wrong length"},